Call for Papers

Below is the call for papers for the upcoming Cutter IT Journal issue Mobile Security: Managing the Madness guest edited by Sebastian Hassinger.

As mobile computing has made sophisticated, digitally-mediated interactions possible in both personal/consumer and business-like capacities (BYOD) – the market and the challenges associated with it have exploded.

Taking a step back to when the technologies that underpin mobile computing and networking were developed, it was assumed that each user had some level of expertise, that the use cases were quite limited in scope, and that the overall numbers of users were constrained. Fast-forward to present day, the massive scale of mobile computing adoption, the broad scope of supported use cases, and the "naive" user base has created a number of serious issues that the IT industry must grapple with now. Chief among these problems is mobile security.

The subject of mobile security has never been more in the public spotlight than now, with most of the recent attention centered on pilfered celebrity pictures. Hosting services like Apple's iCloud were blamed, but regular non-celebrity images have also been compromised via apps and services like the "ephemeral" Snapchat. Private pictures are the tiniest tip of the iceberg now that every mobile device is potentially accessing all manners of financial, health, and other sensitive personal information.

Meanwhile in the enterprise, mobile devices are rapidly over taking PC usage providing employees the convenience of using their mobile devices to perform their jobs wherever and whenever they see fit. This has given rise to a whole new set of challenges as business data and systems can be accessed anywhere/anytime. The benefits of BYOD are vast, as are the risks.

An upcoming issue of Cutter IT Journal will address mobile security from a practical perspective, analyzing the major features of the mobile security landscape and providing practical guidance on steps that can be taken to mitigate the major risks at both the organizational and individual level.

Topics may include, but are not limited to, the following:

  • Is mobile security any different than regular security in a PC or Internet context?

  • What are some threats that are unique to mobile, like baseband OS attacks?

  • What is the more vulnerable attack point -- the device or the cloud services that support them?

  • What are the best practices for building a secure mobile application?

  • What have we learned from recent privacy breaches that can inform our own mobile security "hygiene?"

  • In the era of BYOD, how does enterprise IT deal with mobile security?


Please respond to Sebastian Hassinger at shassinger[at]cutter[dot]com, with a copy to cgenerali[at]cutter[dot]com and include an extended abstract and a short article outline showing major discussion points.


Accepted articles are due by 14 November 2014.


Most Cutter IT Journal articles are approximately 2,500-3,000 words long, plus whatever graphics are appropriate. If you have any other questions, please do not hesitate to contact CITJ's Group Publisher, Christine Generali at cgenerali[at]cutter[dot]com or the Guest Editor, Sebastian Hassinger at shassinger[at]cutter[dot]com. See the editorial guidelines.

Important Note: When you submit an article to Cutter Consortium, you warrant that you (or your employer) are the sole owner of the article and that you have full power and authority to copyright it and publish it. Also, the article you submit to Cutter must be an original; not previously published elsewhere.


Typical readers of Cutter IT Journal range from CIOs and vice presidents of software organizations to IT managers, directors, project leaders, and very senior technical staff. Most work in fairly large organizations: Fortune 500 IT shops, large computer vendors (IBM, HP, etc.), and government agencies. 48% of our readership is outside of the US (15% from Canada, 14% Europe, 5% Australia/NZ, 14% elsewhere). Please avoid introductory-level, tutorial coverage of a topic. Assume you're writing for someone who has been in the industry for 10 to 20 years, is very busy, and very impatient. Assume he or she will be asking, "What's the point? What do I do with this information?" Apply the "So what?" test to everything you write.


We are pleased to offer Journal authors a year's complimentary subscription and five copies of the issue in which they are published. In addition, we occasionally pull excerpts, along with the author's bio, to include in our weekly Cutter Edge e-mail bulletin, which reaches another 8,000 readers. We'd also be pleased to quote you, or passages from your article, in Cutter press releases. If you plan to be speaking at industry conferences, we can arrange to make copies of your article or the entire issue available for attendees of those speaking engagements -- furthering your own promotional efforts.


No other journal brings together so many cutting-edge thinkers, and lets them speak so bluntly and frankly. We strive to maintain the Journal's reputation as the "Harvard Business Review of IT." Our goal is to present well-grounded opinion (based on real, accountable experiences), research, and animated debate about each topic the Journal explores.